0% found this document useful (0 votes)
2K views7 pages

F5 BIG-IP Setup and Licensing Guide

The document provides an overview of the F5 BIG-IP system including its modules like Application Security Manager (ASM), Access Policy Manager (APM), Global Traffic Manager (GTM), and licensing process. It also discusses traffic processing features such as load balancing methods, health monitoring, profiles, and high availability options like device service clustering. Additional sections cover accelerating traffic using connection reuse and an introduction to BIG-IP Access Policy Manager (APM) configuration and features.

Uploaded by

Samir Jha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views7 pages

F5 BIG-IP Setup and Licensing Guide

The document provides an overview of the F5 BIG-IP system including its modules like Application Security Manager (ASM), Access Policy Manager (APM), Global Traffic Manager (GTM), and licensing process. It also discusses traffic processing features such as load balancing methods, health monitoring, profiles, and high availability options like device service clustering. Additional sections cover accelerating traffic using connection reuse and an introduction to BIG-IP Access Policy Manager (APM) configuration and features.

Uploaded by

Samir Jha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
  • Security Management Overview
  • Account and Command Configuration
  • Load Balancing and Monitoring
  • Traffic Group Configuration
  • iRules Scripting
  • HTTP Configuration Details
  • VIPRION Cluster Management

2/8/2015

[Link]

ApplicationSecurityManager(ASM)
AccessPolicyManager(APM)

PolicyBasedCOntrol

SSLVPN

Authentication

SingleSignon
GlobalTrafficManager(GTM)
BIGIPFullProxyArchitecture
Encrypt>unencrypt
compressed>uncompressed
ipv6>ipv4

TMOSOperatingSystemfromF5
FRomLCDyoucan:
ClearAlarms
Reloaddevice
ConfigManagementNetwork
GUIUtility
SelfIP
ManagementIP
TMOSshell(tmsh)
SetupBIGIP
DefaultIPAddress192.168.1.245/24becausehexadecimalofF5is245
ActivateBIGIPLicence[Link]
Steps:
Generatedossier
senddosssiertoF5licenseserver
Generatelicence
BringlicensebacktoBIGIP
FinishlicensingprocessonBIGIP
ProcessofLicensingcanbeAutomaticorManual
ProvisioningLevels
Nominal(recommended)
Allocateonlywhatsneededtoenablemodulefunctions
Allocateadditionalasneededduringoperation
Minimum
Allocateonlywhatsneededtoenablemodulefunctions
Noadditionalresources
Dedicated
Takeeverything
Onemoduleonly
InstallingaDeviceCertificate
Usedforadministrativetasksandintersystemcommunications
BIGIPselfsignedcertificate(default)
ImportCAsignedcertificate(optional)
Storeceriticateon/config/httpd/conf/[Link]/[Link]
data:text/htmlcharset=utf8,%3Cpre%20style%3D%22color%3A%20rgb(0%2C%200%2C%200)%3B%20fontstyle%3A%20normal%3B%20fontvariant%3A

1/7

2/8/2015

[Link]

Rootaccount,noGUIaccess(onlyCLI)andisnotpossibleenableit
Adminaccount,noCLIaccessbutispossibleenableit
Thisbothaccountscannotbedisabe
(ONCLI)
username:root
password:default
(ONGUI)
username:admin
password:admin
Usethecommandconfigtosetupthemanagementnetwork
tmshlistsysmanagementip
(tmos)#save/sysucstrain1_base.ucs
Storeon/var/local/ucs
TheUCSfilehas:
ALLBIGIPspecificconfigfiles
Porductlicences
useraccounts/passwords
DNSzonefiles&ZoneRunnerconfig
SSLcertificatesandkeys
Rollingarchives,configbeforeapplyanewconfig
cs_backup.ucs
cs_backup_rotate.ucs
Allowcheckissues,defects,bestpractises
[Link]
NecessarytogenerateQKViewFile
BIGIPPart2ApplicationDelivery
VirtualServer(VIP)
http_poolpoolofservers
AFullProxyArchitecture
Separateclientandserverconnections
CLIENTSYN>SYN_ACK>ACKVIRTUALSERVER
CLIENTHTTP_GET
SYN>SYN_ACK>ACKandHTTP_GET(totherealserver)
HTTP_RESPONSE(fromrealservertotheclient)
LoadBalacingMethods
Homogeneouspool
NonHomogeneouspooldiferentserverswithdiferentcapacity
Methods:
Static:predefineddistributionpattern
data:text/htmlcharset=utf8,%3Cpre%20style%3D%22color%3A%20rgb(0%2C%200%2C%200)%3B%20fontstyle%3A%20normal%3B%20fontvariant%3A

2/7

2/8/2015

[Link]

Dynamic:Observesruntimeenvironment
adjustdistributionpattern"onthefly"
RoundRobindefaultloadbalancing
Stillexistsloadbalacingevenstatusofpoolisunknown
StatisticsModuleStatisticsLocalTrafficPools/Virtualservers
SourceNATTranslation(SNAT)
YoucanuseAutoMAP,thisusetheFloatingSelfIPoftheinterface
TheSNATisconfiguredinvirtualserversettings
MethodsofHealthMonitoring
Address/ServiceexampleICMP,TCPecho
ContentCheckMonitorexampleHTTP,HTTPS
ApplicationCheckMonitorexampleFTP
PathCheckMonitorexampleGatewayICMP
ConstructingHTTPMonitoring

ApplicationSpecific

ispossibleuseregularexpressions
BehaviourswithProfiles

ProfileParentChildRelationshipandInheritanceDefaultProfile
Parent>ChildInheritbutispossiblecustomizeorcreateacustomprofile
ProfileDependencies
AllVShaveaLayer4profile(defaultisTCP)
Someprofilesdependonothersbutsomeprofilesaremuttualyexclusive
ClientSSLProfile
ServerSSLProfile
System>FileManagement>SSLCertificateList
****LTMPart1HighAvailabilityandTrafficProcessing****
DeviceServiceClustering(DSC)
Devicetrustbasedonmutuallyauthentication(digitalcertificates)
syncfailover
synconlydonotprocessingfailoverdata
DevicetrustDevicesthattrustoneanother
Devicegroupmultipledevicesthattrusteachotherandcansynchronizeconfigdatawithand
failovertooneanother
Onversion11.xadevicegroupcanhaveuntil8BIGIP
TrafficFroupsandConfigSync
data:text/htmlcharset=utf8,%3Cpre%20style%3D%22color%3A%20rgb(0%2C%200%2C%200)%3B%20fontstyle%3A%20normal%3B%20fontvariant%3A

3/7

2/8/2015

[Link]

Trafficgrouprelatedconfigobjectthatproccessparticularapplicationtraffic
ConfigSynctheprocessofsynchronizationconfigdata(virtualservers,pools,monitors,
profiles,....)betweendevicesinadevicegroup
TheHAusestheSelfIPandnottheFloatingSelfIP
UseNTP,andavalidcertificatetoestablishHAcorrectly
LoadBalancingMethods
Static:

RoundRobin(default)

Ratio
Dynamic:

LeastConnections

WeightedLeastConnections

Fastest

Observed

Predictive

DynamicRatio

LeastSessions
Failuremechanisms:

PriorityBasedMemeberActivation

FallbackHost
Theratio3receives3morerequeststhanaRatio1
Ratio(member)andRatio(node)
Ratio1
Ratio2
Ratio3
PriorityBasedMemberactivation
poolRatio(member)
Prioritygroup
Prioritygroupactivation
Thinkingin3PriorityGroups,withratio331
SpecifyingthePriorityGroupActivaiton<2meansthegroupwithlessprioritywillbeused
onlyifoneofthegroupfails
****Module3DirectingTrafficwithiRules*****
AfeweventsiniRules:
CLIENT_ACCEPTED
SERVER_CONNECTED
SERVER_DATA
iRulesConstruct
OPerators==<>starts_withcontainsends_with
Functionsfindstrgetfieldsubstr
Statementsif,switch,log,pool
CommandsHTTP::uriHTTP::headerAES::encryptSIP::call_id
[Link]
[Link]
data:text/htmlcharset=utf8,%3Cpre%20style%3D%22color%3A%20rgb(0%2C%200%2C%200)%3B%20fontstyle%3A%20normal%3B%20fontvariant%3A

4/7

2/8/2015

[Link]

iRulesSyntax
whenCLIENT_ACCEPTED{

if{[[IP::remote_address]starts_with"10."]}{

poolten_pool

}else{

poolcustomer_pool

}
}
iRulebasedonaHeader
whenHTTP_REQUEST{

switch[stringtolower[substr[stringtrimleft[HTTP::headerAcceptLanguage]]02]]
{

"fr"{poolhttp_fr_pool}

"jp"{poolhttp_jp_pool}

default{poolhttp_pool}

}
}
ToapplyaiRulethevirtualserverrequiresaHTTPProfileashttp,afterconfigtheprofile
gotoresourcesandapplutheirulecreatedbefore
****Module4AcceleratingTraffic****
LeveragingOneConnect
OnceaclientconnectedtheBIGIPkeepaConnectionreusepooltousefromthesameclientor
otherclientstoconnecttothesameserverwithaopenedconnection
OptionunderLocalTraffic>Profiles:Services:HTTP
SourceMaskdetermineseligibilityforreusingandopen/idleconnection,thevalue0.0.0.0
meansallclientscanreusethesameconnection.And255.255.255.255onlythesameclientis
abletoreusetheconnectionopened
MaximumSizeMaxconnsheldinConnectionreusepool,ifthemaximumisreached,theBIGIP
systemwillcloseaserversideconnectionaftertheresponseisreceived
MaximumAgeMaxtimeaconnecitoncanstayopenANDidle
Maximumreusemaximumnumberoftimesaconnectioncanbereused
****GettingStartedwithBIGIPAccessPolicyManager(APM)****
WhatisaBIGIPAPM
RemoteAccessSolution
NetworkAccessSSLVN
PortalAccessreverseProxyWebApplications
ApplicationsAccessSingleApplicationTunnelincludingRemoteDesktop
PolicyEnforcementPoint
AuthenticationandAuthorization
EndpointInspection
AccessControlLists
DynamicResourceAssignment(perUserorGroupBasis)
SingleSignon(includeOAM,KerberosandSAML)
data:text/htmlcharset=utf8,%3Cpre%20style%3D%22color%3A%20rgb(0%2C%200%2C%200)%3B%20fontstyle%3A%20normal%3B%20fontvariant%3A

5/7

2/8/2015

[Link]

PolicyenforcementonLTMusingAPM
ProfilesrequiredtoimplementAPM:TCP,ClientSSL,HTTP,ServerSSL,Access
LookslikeaFlowchartconfiguringaAPM
ConfigFullWebTop
Config

HTTPBasics
StatusCodes
100Informational
200Success
300Redirection(301MovedPermanently)
400ClientErrors(400Badrequests,401NotAuthorized,402Notfound)
500ServerErrors(500InternalServerError,505HTTPVersionUnsupported)
ResponseHeaders
ServerandContentFormatInformation
Age
ETag
Location
Server
EntityHeaders
Contentinformation
ContentLength
ContentEncoding
ContentType
LastModified
ProcessExamples
Caching
ContentTransferCompletion
Caching
CachingModels:
Expiration>ReducesRequests
Validation>Reducescontenttransfer
CacheExpiration
ReducesRequests
Example:
ExpiresTues13Feb20[Link]GMT
CacheControl:maxage3600
CacheValidation
ReducesContentTransfer
304NotModifiedStatusCodes
Example:
EtagandIfNoneMatch
LastModifiedandIfModifiedSince
Whenclientreceives304codeusetheobjectinlocalcache
data:text/htmlcharset=utf8,%3Cpre%20style%3D%22color%3A%20rgb(0%2C%200%2C%200)%3B%20fontstyle%3A%20normal%3B%20fontvariant%3A

6/7

2/8/2015

[Link]

ContentTransferCompletion
VIPRIONBasics
[Link]
todoafailover
Mirroringcanbedoneinsamecluster,[Link]
clusters,mirroringsesseionstatetoapeer
VirtualClusteredMultiProcessing(vCMP)aclusterofvirtualmachinesrunningTMOSis
calledavCMPguest
ImportantVIPRIONcommands
Bladectlallowauserremotelyperformsimpletasks(likerebootablade,connecttoconsole
ports)inotherbladesinaVIPRIONchassis
clshallowausertoexecutethecommandoneveryactiveblade,userclshcommandasa
prefixtothebeginningosanothercommand
tmsh/sysvcmp
tmsh/sysclustermodifytheconfioftheprimarybladeinacluster,thesystemwill
propagateallchangestotheotherbladesinthecluster(knownasclustersynchronization)
TroubleshootingBasics
EndUSerDiagnostics(EUD)
AccessedviaGRUB
VIPRIONSpecifictests:Clustering,Hardwareproblems
TwoVIPRIONEUDBranches
EUD_V(VIPRION4000)
EUD_S(VIPRION2000)
!!!!Warning!!!!
DonorunitinaproductionEnvironment
Removeallbladesfromchassis
RunEUDdirectlyonbladebeingtested
OutofBandManagement
LightsOutProcessor(LOP)VIPRION2000Series
SerialPortRedirector(SPR)VIPRION4000Series
invokeLOP/SPRattheconsolewithEscthenShift+(9

data:text/htmlcharset=utf8,%3Cpre%20style%3D%22color%3A%20rgb(0%2C%200%2C%200)%3B%20fontstyle%3A%20normal%3B%20fontvariant%3A

7/7

Common questions

Powered by AI

iRules in the BIG-IP system act as customizable scripts that manage and manipulate network traffic in real time. They enable conditional decision-making based on traffic attributes, such as client IP or HTTP headers, using operators, functions, and control statements like 'if' and 'switch'. iRules significantly impact traffic direction by allowing deployment of tailored logic for routing traffic efficiently to specific pools or backend servers, responding to client requests dynamically, and implementing sophisticated security measures .

The Full Proxy architecture of BIG-IP enhances security and performance by separating client and server connections. This ensures that each side of the connection is managed independently, providing the ability to encrypt and decrypt data at each end as needed and manage different protocol versions such as IPv6 to IPv4 translations. This type of architecture also supports comprehensive health monitors and allows for tailored traffic management, optimizing load balancing and network resource utilization .

The Full Proxy architecture in the BIG-IP system allows for SSL encryption and decryption to occur independently between client and server sides, enhancing both security and performance. This separation enables SSL offloading, where encryption and decryption tasks are handled by the BIG-IP system, reducing the resource burden on backend servers and enabling centralized management of SSL certificates. It also increases security by allowing thorough inspection and modification of data while it is encrypted, preventing attacks such as SSL Strip and providing a secure connection termination at the proxy .

The BIG-IP system ensures high availability and synchronized configuration in a device cluster through Device Service Clustering (DSC). DSC uses mutually authenticated devices with digital certificates to build trust within the group. It employs ConfigSync to synchronize configuration data, including virtual servers, pools, monitors, and profiles, across all devices in the cluster. High availability is maintained by allowing devices to failover within traffic groups, which handle particular application traffic independently and can have multiple devices assigned to manage it .

The manual licensing process for BIG-IP involves several steps that ensure legal and functional use of the system. First, a dossier is generated, which is a unique file identifying the system hardware and software. This dossier is sent to the F5 license server where a license key is generated. The generated license is then brought back and applied to the BIG-IP system, completing the licensing process. Each step is crucial for validating the right to use the software, linking the license to specific hardware, and ensuring compliance with F5's licensing terms .

The BIG-IP Access Policy Manager (APM) provides a remote access solution encompassing several functionalities including network access through SSL VPN, portal access via reverse proxy for web applications, and applications access using a single application tunnel. It also supports remote desktop access, policy enforcement point for authentication and authorization, endpoint inspection, access control lists, dynamic resource assignment on a per-user or group basis, and single sign-on capabilities utilizing OAM, Kerberos, and SAML for authentication .

The tmsh utility in the BIG-IP system serves as a command-line interface tool for managing and configuring the system's network settings, services, and resources. It provides the capability to adjust configurations ranging from managing IP settings, executing system backups, configuring virtual servers, pools, and monitoring their status. Tmsh is indispensable for administrators seeking to perform granular management tasks beyond the GUI capabilities, allowing for immediate changes and system utility access .

Caching models in BIG-IP, such as expiration and validation, significantly impact the reduction of content transfer and request frequency. Expiration-based caching minimizes requests by controlling content expiry with directives like Cache-Control and Expires headers, promoting reuse of cache-stored data. Validation model reduces content transfer by using status codes like 304 Not Modified, allowing clients to use cached responses when no changes are detected. Overall, these models improve bandwidth efficiency, server load management, and fast content delivery, though they require accurate configuration for effective performance .

Dynamic Load Balancing methods, such as Least Connections and Dynamic Ratio, offer the advantage of real-time adjustments based on current server load conditions, optimizing performance and resource utilization. However, these methods can pose challenges, such as increased complexity in configuration and management, potential latency in response time due to constant recalibration, and reliance on accurate historical data and predictions for future traffic patterns. These challenges require robust monitoring and a clear understanding of the network environment for effective implementation .

In the BIG-IP high availability setup, device trust and traffic groups are crucial for the failover mechanism. Device trust is established through mutually authenticated digital certificates, ensuring that only trusted devices participate in the configuration synchronization and failover processes. Traffic groups, which are collections of related configuration objects, manage specific application traffic. In a failover event, traffic groups allow traffic to seamlessly switch to another device, ensuring continuity and minimizing service disruption. This method enhances reliability and maintains consistent application delivery .

You might also like